Published on : January 22, 2019 by Daniel Wren
TOR in a first glance, is used to browse the darknet or to by-pass the firewall restriction. i.e if your firewall blocks certain website you can use TOR browsers to access them. Its really tough to block access to TOR network when your users are using TOR bridges. I know of a few firewalls which […]
Published on : January 14, 2019 by Daniel Wren
Swap space in Linux is used when the amount of physical memory (RAM) is full. If the system needs more memory resources and the RAM is full, inactive pages in memory are moved to the swap space. Swap space is located on hard drives, which have a slower access time than physical memory and is […]
Published on : January 7, 2019 by Smith Nevil
Lot of details about SysRq is written in the documentation available at https://www.kernel.org/doc/html/v4.11/admin-guide/sysrq.html . If you are a person who prefers the RTFM mode, please go ahead and read the above URL. What if a linux system seems unresponsive to you? For many years, as with many novices, I used to do a power reset. […]
Published on : October 13, 2018 by Ruben Roy
Data Management has an important role in a company’s operational infrastructure. It will be really challenging for the organization to manage these vast amounts of data. An organization should make sure that the data is secure and redundant. Data should have proper backup and if any disaster occurs, data should be recovered using effective data […]
Published on : September 14, 2018 by Sajith Lal V.S
Outsourcing is an important factor that decides the future of your business. The main confusion among the business owners is how and what all services can they outsource. Always remember one thing, retain control over the aspects that make your business unique. Another aspect you should keep in mind is to avoid outsourcing the areas […]